Network flows build the basis of modern network data analysis by aggregating properties of network packets with common characteristics. A consistent and unambiguous definition of …
JM Spring, P Illari - Digital Threats: Research and Practice, 2021 - dl.acm.org
We review practical advice on decision-making during computer security incident response. Scope includes standards from the IETF, ISO, FIRST, and the US intelligence community. To …
MH Yang, MC Yang - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
Because the Internet has been widely applied in various fields, more and more network security issues emerge and catch people's attention. However, adversaries often hide …
W John, S Tafvelin, T Olovsson - Computer Communications, 2010 - Elsevier
Due to its versatility, flexibility and fast development, the modern Internet is far from being well understood in its entirety. A good way to learn more about how the Internet functions is …
SY Kim, SW Yun, EY Lee, SH Bae, IG Lee - Electronics, 2020 - mdpi.com
With the recent development and popularization of various network technologies, communicating with people at any time, and from any location, using high-speed internet …
ES Pilli, RC Joshi, R Niyogi - … & Workshop on Emerging Trends in …, 2011 - dl.acm.org
Network forensics is an alternate approach to security, which monitors network traffic, stores the traces, detects anomalies, identifies the nature of attack, and investigates the source of …
We have collected several large-scale datasets in a number of passive measurement projects on an Internet backbone link belonging to a national university network. The …
L Chen, Y Jiang, X Kuang, A Xu - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The construction of digital power grid is the key task of China Southern Power Grid Corporation. However, with the application of new technologies such as “cloud, big data and …
Background: Cybersecurity has risen to international importance. Almost every organization will fall victim to a successful cyberattack. Yet, guidance for computer security incident …